gets C
1
P
1
. Then both parties encrypt the data a sec-
ond time, and determine the common tuples. The first
party N
1
decrypts the first common tuple and sends
it as h to N
2
. However, N
2
has no evidence that the
decrypted data is really in the intersection. N
1
may
have cheated and have sent an arbitrary item of C
1
P
2
to
N
2
. N
2
would wrongly assume that this item is in the
intersection, decrypt it with its key and send the hash
value back to N
1
. In this case, N
1
does not only know
the hash value but also whether the associated data is
really in the intersection. Furthermore, N
1
can store
the hash value in order to check if future customers
are also in the database of N
2
. The crux of adapting
this approach to a step-by-step exchange is that N
2
has
no means to determine if N
1
plays fair.
In contrast, our solution is suitable for an arbitrary
number of participants and is not restricted to n = 2
like our previous contribution (B
¨
ottcher and Ober-
meier, 2006), and focuses on a model where each of
the n participants may act malicious and may not only
stop the protocol execution, but may also change mes-
sages or fake data. We introduce the term information
unit and show that no secure exchange protocol ex-
ists that can guarantee an atomic exchange of a single
information unit. Furthermore, we add an additional
verification phase, which will detect any cheating of a
participant.
Since we reveal the decrypted information units of
the intersection step by step, proposals for guarantee-
ing a fair data exchange are also relevant. Some of
these proposals rely on a trusted third party (Ajmani
et al., 2001; Jefferies et al., 1995), while other propos-
als do not necessarily need this third party. (Asokan
et al., 1997; Asokan et al., 1998), for example, de-
scribe an approach for a fair exchange of items by
using a third party only if participants cheat. If a third
party is present but not trustable, (Franklin and Re-
iter, 1997) shows an approach to use this third party
for fair data exchange. (Asokan et al., 1997) classifies
the type of the exchanged items, and claims to guar-
antee an atomic exchange for items belonging to the
categories revocable or generatable. However, since
enterprise information is in many cases neither re-
vocable nor generatable, the approach to use a third
party for collecting affidavits and starting law suits
in case of malicious participants is suitable for goods
and items, but cannot be used to revoke the reveal
of sensible enterprise data. In contrast, our approach
does not rely on a certain item category; it is useful
for non-revocable and non-generatable items as well.
6 SUMMARY AND CONCLUSION
In this contribution, we have presented an applica-
tion scenario where multiple parties need a secure
exchange of common information, although they do
not trust each other and assume malicious behavior.
We have shown that atomicity for the exchange of the
common data is not possible if no trusted third party is
used for this purpose. Furthermore, we have proposed
a solution, which reduces the damage that each party
suffers in case that another party alters the exchange
protocol to the disclosure of one additional indepen-
dent information unit. We have shown experimental
results on the trade-off “trust vs. exchange speed”,
and demonstrated that even in an environment with
high message latency our protocol is still feasible.
In the future, we plan to investigate a secure and
secret processing of arbitrary database algebra expres-
sions.
REFERENCES
Agrawal, R., Evfimievski, A. V., and Srikant, R. (2003). In-
formation sharing across private databases. In Pro-
ceedings of the 2003 ACM SIGMOD International
Conference on Management of Data, San Diego, Cal-
ifornia, USA, pages 86–97.
Agrawal, R. and Terzi, E. (2006). On honesty in sovereign
information sharing. In 10th International Conference
on Extending Database Technology, pages 240–256,
Munich, Germany.
Ajmani, S., Morris, R., and Liskov, B. (2001). A trusted
third-party computation service. Technical Report
MIT-LCS-TR-847, MIT.
Asokan, N., Schunter, M., and Waidner, M. (1997). Opti-
mistic protocols for fair exchange. In CCS ’97: Pro-
ceedings of the 4th ACM conference on Computer and
communications security, pages 7–17. ACM Press.
Asokan, N., Shoup, V., and Waidner, M. (1998). Asyn-
chronous protocols for optimistic fair exchange. In
Proceedings of the IEEE Symposium on Research in
Security and Privacy, pages 86–99.
B
¨
ottcher, S. and Obermeier, S. (2006). Sovereign informa-
tion sharing among malicious partners. In Secure Data
Management, Third VLDB Workshop, Seoul, Korea,
pages 18–29.
Clifton, C., Kantarcioglu, M., Lin, X., Vaidya, J., and Zhu,
M. (2003). Tools for privacy preserving distributed
data mining.
Diffie, W. and Hellman, M. E. (1976). New directions in
cryptography. IEEE Transactions on Information The-
ory, IT-22(6):644–654.
Du, W. and Atallah, M. J. (2001). Secure multi-party com-
putation problems and their applications: A review
and open problems. In New Security Paradigms Work-
shop, pages 11–20, Cloudcroft, New Mexico, USA.
SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS
353